Sycret Voice is a hardware based coded solution for those who anxious about communication security as well as want to have the on confidential data storage.
In contrary to other coding systems based on software solutions only, coding is done not inside the operational system of the equipment itself, but directly on the physical crypto HSM module inside Encrypter card.
Sycret Voice is at present the only on the market mobile hardware based security solution for secure communication with the certificate of FIPS 140-2 Level 3.
Level 3 provides complete data security and privacy on a physical attack to the cryptographic module, and when it is necessary, it provides possibility to delete or permanent damages of data stored in the cryptographic module as well as in the memory card of the Encrypter.
The Encrypter card is the ideal hardware solution for companies, where the communication is done in multi level way.
It is just here the coding process and information storage take place. The Encrypter card includes also the random number generator to support generating RSA keys.
Data security on the card warrants logging protection with a code PIN of 4 to 16 characters. Introducing incorrect code PIN five times causes blocking the card automatically.
Attack of the malicious software of the Trojan type or SpyPhone can steal bank accounts, e-mails, SMS messages, location as well as other confidential key for operation of your company without your notice.
The MAN-IN-THE-MIDDLE action, tends towards achieving confidential information by pretending another person or institution.
Spying, EAVESDROPPING and registering telephone calls are being conducted in the real time
Physical attack and stealing easily all data, contacts and secret keys.
If you do not want to be overheard, stolen of confidential information, then Sycret Voice is ideally designed for you. The coding system makes possible to set up complete peer to peer communication secure channel.
Our encryption system is totally independent from the operating system, Android. By placing the coding process inside the SDencrypter card, you get unprecedented untill now in commercial solutions resistance to malicious software.
Not to waste of time, money and loss of confidential information when developing your own company, you will need trusted technolog offered by Sycret Voice.
The Sycret Voice protects us against overhearing telephone calls in the real time as well as against registration of them.
It does not matter if the overhearing is done from the level of the cellular telephony operator, or using specialistic equipment intercepting voice communication such as the Interceptor GSM or IMSI Catcher.
Each call will be strongly coded and secured against overhearing.
The Sycret Voice protects us against intercepting ongoing chats in the Internet. Here also the protection includes not only the real duration of the chat, but also unwanted recording.
he Sycret IM protects each chat independently from the intercepting attempt, which can be done from the cellular telephony operator level, Internet provider, or specialistic equipment intended for intercepting messages of GSM or IMSI Catcher interceptor.
No access to Internet? You can still continue to use secure encrypted communication using the GSM network of the cellular telephony operator.
You only need to use the Secure SMS and your SMS messages will be secured against all attempts of intercepting them.
The Safe Box is a type of the virtual vault where you can safely store your data with no fears without worry off or modified.
All data is encrypted and stored directly in the Encrypter card. The data is totally independent from the operational system of the equipment, malicious software as well as from man-in-the-middle attack.
Do you want to send big sized data files safely? Do you want to share confidential documents or photographs with your friends or colleagues?
Take advantage of the Sycret Cloud application that makes you possible to integrate with the Dropbox account safely.
Files are encrypted by security module inside Encrypter and then directly uploaded to the. You do what you always do and it is safely as ever.
The FIPS 140-2 is the standard established by the United States Government that describes requirements related to coding and physical security, used to computer products appropriated for processing essential data.
The Level 3 is the third of four possible protection levels. It includes, among others, safeguards against physical infringement of protections, coding data using crypto keys as well as possibility of removing critical security parameters in the case of physical protections infringement.
Achieving FIPS requires to satisfy a series of rigorous tests being done at laboratories accredited by the National Institute of Standardisation and Technologies (NIST). Only positive satisfying the research process allows achieving the certificate
Warranty that the certified product satisfies all security standards in the scope of coding and data protecting security at the level 3 of protections.
CC (Common Criteria) is the international quality standard defining evaluation criteria of the security level for teleinformation systems
EAL (Evaluation Assurance Level) is the process based on checking conformity of teleinformation protection with the CC standard. The checking is done according to seven levels of specificity, from EAL1 up to EAL 7, and it is done in accredited laboratories
A product of the CC EAL 5+ standard provides a very high level of security and warrants that all protections declared by the manufacturer act according to the requirements defined for a given EAL level. The higher level the more rigorous and detailed requirements related to the design of the product protections and higher quality warranty of the protection. The Level EAL 5 means that the product passed positive verification in relation to the physical, environmental security, protection of network connections, as well as it was semiformally designed and tested). *The expression of “semiformal” is understood as „expressed in the language of precisely defined syntax and defined semantics”
Sending coded SMS messages between users A and B is done by a standard SMS service of the GSM operator with omitting Sycret Voice servers.
The mechanism of actions marked blue colour in the scheme is based on the VoIP technology. After direct connection (peer to peer) of the users through intermediating server, the handshake process of agreeing a single crypto key takes place.
Then, generating and decoding of the key take place between the users. After completing the call, the key is immediately eliminated. Thanks to carrying out the communication using the Sycret Voice, there also is no possibility to define who and with whom communicated himself. In the case of cloud, the mechanism is done similarly. After connecting by the server the coding process takes place and next the transmission of coded information to the dropboxDropbox, where the recipient can receive them thanks to the Sycret Cloud application, which decodes them and makes possible to use the contents.
Safe box, i.e. safe storage of data in the Encrypter card. Important information is coded and stored directly in the card without participation of the Android operating system. Such a solution protects data against malicious software attack and warrants its safeguarding in the case of stealing the telephone set.
All encryption process is done out of the operating system of the telephone set. The coding is done in the secure HSM module inside the Encrypter card. Information and SMS messages, before coding, are transferred exclusively by the Sycret Voice application as well as by the Encrypter API (Program Interface of the API application) and Go-Trust API.
Thanks to the application that uses the protocol of the mass memory they are sent to the memory controller, and next – after passing through the special GO-Trust protection and flash memory controller, they are coded in the SD Encrypter card using the security chip.
Data coded in this way comes back through the controller and protection to the application Sycret Voice, which sends it safely by the Internet or SMS service to the recipient giving the warranty that nobody has the access to the call and message, except of Sycret Voice users.